Forem

# hacking

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The 1% of Hacking Nobody Talks About… But Should

The 1% of Hacking Nobody Talks About… But Should

1
Comments 3
2 min read
Web Cache Deception Attacks

Web Cache Deception Attacks

Comments
2 min read
Best Security Practices in Express.js – A Beginner's Guide
Cover image for Best Security Practices in Express.js – A Beginner's Guide

Best Security Practices in Express.js – A Beginner's Guide

1
Comments
3 min read
手把手教你在 Termux 安装 Kali NetHunter(Rootless 黑客风格教程)

手把手教你在 Termux 安装 Kali NetHunter(Rootless 黑客风格教程)

Comments 2
2 min read
Attacking WebDAV Protocol

Attacking WebDAV Protocol

Comments
1 min read
Next.js Middleware Broken Access Controls
Cover image for Next.js Middleware Broken Access Controls

Next.js Middleware Broken Access Controls

1
Comments
1 min read
Is Hacking Possible? Security Vulnerabilities and Defense
Cover image for Is Hacking Possible? Security Vulnerabilities and Defense

Is Hacking Possible? Security Vulnerabilities and Defense

Comments
8 min read
Cicada Hack The Box Writeup

Cicada Hack The Box Writeup

Comments
13 min read
RootMe CTF
Cover image for RootMe CTF

RootMe CTF

1
Comments
3 min read
How to protect yourself against cyber threats
Cover image for How to protect yourself against cyber threats

How to protect yourself against cyber threats

Comments
3 min read
Computer Science Movies #2: Operation Takedown
Cover image for Computer Science Movies #2: Operation Takedown

Computer Science Movies #2: Operation Takedown

Comments
1 min read
Understanding SQL Injection: A Major Security Threat
Cover image for Understanding SQL Injection: A Major Security Threat

Understanding SQL Injection: A Major Security Threat

13
Comments
3 min read
The Impact of SQL Injection: Understanding the Potential Risks and Consequences
Cover image for The Impact of SQL Injection: Understanding the Potential Risks and Consequences

The Impact of SQL Injection: Understanding the Potential Risks and Consequences

6
Comments
4 min read
How We Removed a Crypto Miner Malware That Exploited Linux File Attributes

How We Removed a Crypto Miner Malware That Exploited Linux File Attributes

1
Comments
2 min read
SSRF retrieving temporary credentials from AWS Metadata

SSRF retrieving temporary credentials from AWS Metadata

Comments
1 min read
🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply
Cover image for 🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply

🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply

Comments
2 min read
100% CSS: Fetch and Exfiltrate 512 bits of Server-Generated Data Embedded in an Animated SVG

100% CSS: Fetch and Exfiltrate 512 bits of Server-Generated Data Embedded in an Animated SVG

44
Comments
20 min read
Path traversal via alias misconfiguration in Nginx
Cover image for Path traversal via alias misconfiguration in Nginx

Path traversal via alias misconfiguration in Nginx

Comments
1 min read
GETting your IP Address with CSS - and other 32 bit API responses - without JavaScript!

GETting your IP Address with CSS - and other 32 bit API responses - without JavaScript!

72
Comments 7
11 min read
Common Cybersecurity Misconceptions and How to Avoid Them
Cover image for Common Cybersecurity Misconceptions and How to Avoid Them

Common Cybersecurity Misconceptions and How to Avoid Them

Comments
2 min read
Code Smell 284 - Encrypted Functions
Cover image for Code Smell 284 - Encrypted Functions

Code Smell 284 - Encrypted Functions

Comments
5 min read
You Could Lose All Your Crypto In a Job Interview
Cover image for You Could Lose All Your Crypto In a Job Interview

You Could Lose All Your Crypto In a Job Interview

2
Comments
3 min read
[PT-BR] Introdução ao Frida: Como Manipular Memória em Tempo Real com TypeScript (e DOOM)
Cover image for [PT-BR] Introdução ao Frida: Como Manipular Memória em Tempo Real com TypeScript (e DOOM)

[PT-BR] Introdução ao Frida: Como Manipular Memória em Tempo Real com TypeScript (e DOOM)

2
Comments
8 min read
[EN] Introduction to Frida: Real-Time Memory Manipulation with TypeScript (and DOOM)
Cover image for [EN] Introduction to Frida: Real-Time Memory Manipulation with TypeScript (and DOOM)

[EN] Introduction to Frida: Real-Time Memory Manipulation with TypeScript (and DOOM)

4
Comments
8 min read
Day 46: Adversarial Attacks on LLMs

Day 46: Adversarial Attacks on LLMs

1
Comments
2 min read
loading...